DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
26c42aa73760c111490d256eebbe0da3_JaffaCakes118.dll
Resource
win7-20240708-en
Target
26c42aa73760c111490d256eebbe0da3_JaffaCakes118
Size
80KB
MD5
26c42aa73760c111490d256eebbe0da3
SHA1
aac0899e415b5119be43ba69a5f83a6017b9b87e
SHA256
b32c96d5145e8a9fdbefb0249448c6ca54f6147264e0421ab4a2c66bed07682e
SHA512
deba6dbfc205b5705758e1afa30b616a476a8601bcdf651c90ee316283a806bf9aa5a6ef407cf9eefb9403cfcaaad98060d9629ef966334c2c39c4491900520a
SSDEEP
1536:itGbSa1aTvVt4KlU5vmbgb8qlkduFApBu+sv4tF8JH:/gTV6yU5OZqlfh4tFIH
Checks for missing Authenticode signature.
resource |
---|
26c42aa73760c111490d256eebbe0da3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
MoveFileA
GetExitCodeProcess
CloseHandle
WaitForSingleObject
GetSystemDirectoryA
Sleep
LocalFree
CreateDirectoryA
Process32Next
Process32First
DisableThreadLibraryCalls
InitializeCriticalSection
lstrlenW
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateThread
GetCommandLineW
WritePrivateProfileStringA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
ExitProcess
GetCurrentProcessId
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
FindNextFileA
DeleteFileA
CreateProcessA
RemoveDirectoryA
DeleteCriticalSection
SetNamedSecurityInfoA
SetEntriesInAclA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strchr
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
_purecall
memcpy
fopen
fseek
ftell
fread
fclose
strcat
strcpy
memset
_access
sprintf
??3@YAXPAX@Z
strstr
strrchr
memcmp
atoi
_stricmp
strlen
strcmp
??2@YAPAXI@Z
strncpy
strncmp
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ